{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:39Z","timestamp":1763468199133},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439357"},{"type":"electronic","value":"9783662439364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_19","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T12:05:04Z","timestamp":1403870704000},"page":"292-306","source":"Crossref","is-referenced-by-count":28,"title":["Attribute-Aware Relationship-Based Access Control for Online Social Networks"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Jaehong","family":"Park","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Bruns, G., Fong, P.W., Siahaan, I., Huth, M.: Relationship-based access control: its expression and enforcement through hybrid logic. In: Proceedings of the Second CODASPY, pp. 117\u2013124. ACM (2012)","DOI":"10.1145\/2133601.2133616"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proceedings of the 14th SACMAT, pp. 177\u2013186. ACM (2009)","DOI":"10.1145\/1542207.1542237"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1734","DOI":"10.1007\/11915072_80","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"B. Carminati","year":"2006","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Rule-based access control for social networks. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.\u00a04278, pp. 1734\u20131744. Springer, Heidelberg (2006)"},{"issue":"1","key":"19_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1609956.1609962","volume":"13","author":"B. Carminati","year":"2009","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM TISSEC\u00a013(1), 6 (2009)","journal-title":"ACM TISSEC"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Park, J., Sandhu, R.: Relationship-based access control for online social networks: beyond user-to-user relationships. In: PASSAT 2012, pp. 646\u2013655. IEEE (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-31540-4_2","volume-title":"Data and Applications Security and Privacy XXVI","author":"Y. Cheng","year":"2012","unstructured":"Cheng, Y., Park, J., Sandhu, R.: A user-to-user relationship-based access control model for online social networks. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol.\u00a07371, pp. 8\u201324. Springer, Heidelberg (2012)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the First CODASPY, pp. 191\u2013202. ACM (2011)","DOI":"10.1145\/1943513.1943539"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-04444-1_19","volume-title":"Computer Security \u2013 ESORICS 2009","author":"P.W.L. Fong","year":"2009","unstructured":"Fong, P.W.L., Anwar, M., Zhao, Z.: A privacy preservation model for facebook-style social network systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 303\u2013320. Springer, Heidelberg (2009)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Fong, P.W., Siahaan, I.: Relationship-based access control policies and their policy languages. In: Proceedings of the 16th SACMAT, pp. 51\u201360. ACM (2011)","DOI":"10.1145\/1998441.1998450"},{"key":"19_CR10","unstructured":"Gates, C.: Access control requirements for Web 2.0 security and privacy. IEEE Web 2.0 (2007)"},{"issue":"4","key":"19_CR11","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1145\/1183463.1183470","volume":"6","author":"J. Golbeck","year":"2006","unstructured":"Golbeck, J., Hendler, J.: Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology (TOIT)\u00a06(4), 497\u2013529 (2006)","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"19_CR12","unstructured":"Golbeck, J.A.: Computing and Applying Trust in Web-based Social Networks. PhD thesis, University of Maryland at College Park, College Park, MD, USA (2005)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-31540-4_4","volume-title":"Data and Applications Security and Privacy XXVI","author":"X. Jin","year":"2012","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol.\u00a07371, pp. 41\u201355. Springer, Heidelberg (2012)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/11836025_15","volume-title":"The Semantic Web \u2013 ASWC 2006","author":"S.R. Kruk","year":"2006","unstructured":"Kruk, S.R., Grzonkowski, S., Gzella, A., Woroniecki, T., Choi, H.-C.: D-FOAF: Distributed identity management with access rights delegation. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol.\u00a04185, pp. 140\u2013154. Springer, Heidelberg (2006)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Joshi, J.: OSNAC: an ontology-based access control model for social networking systems. In: SocialCom 2010, pp. 751\u2013759. IEEE (2010)","DOI":"10.1109\/SocialCom.2010.116"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R., Cheng, Y.: ACON: activity-centric access control for social computing. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 242\u2013247. IEEE (2011)","DOI":"10.1109\/ARES.2011.42"},{"issue":"5","key":"19_CR17","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2011.30","volume":"15","author":"J. Park","year":"2011","unstructured":"Park, J., Sandhu, R., Cheng, Y.: A user-activity-centric framework for access control in online social networks. IEEE Internet Computing\u00a015(5), 62\u201365 (2011)","journal-title":"IEEE Internet Computing"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Shen, H., Hong, F.: An attribute-based access control model for web services. In: PDCAT 2006, pp. 74\u201379. IEEE (2006)","DOI":"10.1109\/PDCAT.2006.28"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE ICWS, pp. 561\u2013569. IEEE (2005)","DOI":"10.1109\/ICWS.2005.25"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T04:59:39Z","timestamp":1558933179000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}